Searching the Encrypted Cloud Data using Fast Phrase Search Algorithm

Authors

  • MC Priyanka  SV Engineering College for Women, Tirupati, Andhra Pradesh, India
  • A. Saritha  SV Engineering College for Women, Tirupati, Andhra Pradesh, India

Keywords:

Conjunctive keyword search, Phrase search, Privacy, Security, Encryption

Abstract

Cloud computing has created a lot enthusiasm for the examination network as of late for its numerous aspects of curiosity, nevertheless has likewise carry protection and safety considerations. The ability and entry of private archives had been distinguished as one of the vital focal problems in the zone. Chiefly, countless professionals explored solutions for appear over scrambled archives put away on faraway cloud servers. Whilst numerous plans were proposed to participate in conjunctive watchword appear, much less consideration has been famous on extra distinctive seeking programs. On this paper, we present an expression look system in gentle of Bloom channels that's essentially quicker than existing preparations, with comparative or better stockpiling and correspondence price. Our system utilizes a development of n-gram channels to support the usefulness. The plan shows an exchange off amongst potential and false confident cost, and is flexible to defend in opposition to incorporation connection assaults. An overview method in view of software’s function false optimistic expense is likewise portrayed.

References

  1. Boneh, G. D. Crescenzo, R. Ostrovsky, and G. Persiano, "Public key encryption with keyword search," in In proceedings of Eurocrypt, 2004, pp. 506-522.
  2. Waters, D. Balfanz, G. Durfee, and D. K. Smetters, "Building an encrypted and searchable audit log," in Network and Distributed System Security Symposium, 2004.
  3. Ding, F. Gao, Z. Jin, and H. Zhang, "An efficient public key encryption with conjunctive keyword search scheme based on pairings," in IEEE International Conference onNetwork Infrastructure and Digital Content, 2012, pp. 526-530.
  4. Kerschbaum, "Secure conjunctive keyword searches for unstructured text," in International Conference on Network and System Security, 2011, pp. 285-289.
  5. Hu and P. Liu, "Public key encryption with ranked multikeyword search," in International Conference on Intelligent Networking and Collaborative Systems, 2013, pp. 109-113.
  6. Fu, X. Sun, N. Linge, and L. Zhou, "Achieving effective cloud search services: multi-keyword ranked search over encrypted cloud data supporting synonym query," IEEE Transactions on Consumer Electronics, vol. 60, pp. 164-172, 2014.
  7. L. A. Clarke, G. V. Cormack, and E. A. Tudhope, "Relevance ranking for one to three term queries," Information Processing and Management: an International Journal, vol. 36, no. 2, pp. 291-311, Jan. 2000.
  8. Tuo and M. Wenping, "An effective fuzzy keyword search scheme in cloud computing," in International Conference on Intelligent Networking and Collaborative Systems, 2013, pp. 786-789.
  9. Zheng and H. Zhou, "An efficient attack on a fuzzy keyword search scheme over encrypted data," in International Conference on High Performance Computing and Communications and Embedded and Ubiquitous Computing, 2013, pp. 1647-1651.
  10. Zittrower and C. C. Zou, "Encrypted phrase searching in the cloud," in IEEE Global Communications Conference, 2012, pp. 764- 770.
  11. Tang, D. Gu, N. Ding, and H. Lu, "Phrase search over encrypted data with symmetric encryption scheme," in International Conference on Distributed Computing Systems Workshops, 2012, pp. 471-480.
  12. Poon and A. Miri, "An efficient conjunctive keyword and phrase search scheme for encrypted cloud storage systems," in IEEE International Conference on Cloud Computing, 2015.
  13. "A low storage phrase search scheme based on bloom filters for encrypted cloud services," to appear in IEEE International Conference on Cyber Security and Cloud Computing, 2015.
  14. S. Rhee, I. R. Jeong, J. W. Byun, and D. H. Lee, "Difference set attacks on conjunctive keyword search schemes," in Proceedings of the Third VLDB International Conference on Secure Data Management, 2006, pp. 64-74.
  15. Cai, C. Hong, M. Zhang, D. Feng, and Z. Lv, "A secure conjunctive keywords search over encrypted cloud data against inclusion-relation attack," in IEEE International Conference on Cloud Computing Technology and Science, 2013, pp. 339-346.
  16. Yang, H. Lu, and J. Weng, "Multi-user private keyword search for cloud computing," in IEEE Third International Conference on Cloud Computing Technology and Science, 2011, pp. 264-271.
  17. Wang, N. Cao, J. Li, K. Ren, and W. Lou, "Secure ranked keyword search over encrypted cloud data," in International Conference on Distributed Computing Systems, 2010, pp. 253-262.
  18. T. Goodrich, M. Mitzenmacher, O. Ohrimenko, and R. Tamassia, "Practical oblivious storage," in Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012, pp. 13-24.
  19. Chor, O. Goldreich, E. Kushilevitz, and M. Sudan, "Private information retrieval," in Proceedings of the 36th Annual Symposium on Foundations of Computer Science, 1995, pp. 41-50.
  20. S. Ruj, M. Stojmenovic, and A. Nayak, "Privacy preserving access control with authentication for securing data in clouds," in Proceedings of the 2012 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, 2012, pp. 556-563.

Downloads

Published

2018-10-30

Issue

Section

Research Articles

How to Cite

[1]
MC Priyanka, A. Saritha, " Searching the Encrypted Cloud Data using Fast Phrase Search Algorithm, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 7, pp.259-265, September-October-2018.